When your organisation is designing a new information security infrastructure or when there is a need to update the old infrastructure with specific functions, renew or purchase software or hardware, you face a difficult challenge of having to choose the technology that best suits your needs.

In order to make this choice a more informed one, during the CDEA'13 we are going to introduce you to a set of proven, effective, state-of-art technologies and tools. After the demonstrations you will understand the purpose, benefits and operational features of these industry-standard and leading technology solutions.

SECURITY INFORMATION EVENT MANAGEMENT (SIEM) DEMO

Failure to effectively manage the massive amount of data generated in the event logs that network, security and other devices collect, perform the necessary analysis and respond to detected anomalous user behaviours and suspicious events can have a serious impact on the information security of the organisation.

In this demonstration, you will see how SIEM technology allows organisations to automate the process of effectively collecting, correlating and analysing events logged within your infrastructure and produced in multiple locations to spot trends and see patterns that are out of ordinary. You will see how this allows proactively identifying threats that could lead to a data breach and reducing the time from incident detection to containment and remediation.

In addition, SIEM is one of the mandatory tools to ensure management of IT security of organisation, integrating under one umbrella all other activities, including incident response, security monitoring, reporting, analysis, and compliance.

FORENSICS DEMO

Even if your organisation is effectively protecting all of the weakest parts and all of the main resources, it is still vulnerable because there is no way to know the time, tools, direction and goals of a possible cyber-attack. Therefore, it is important that in case of fraud, intellectual property theft, industrial espionage, network compromises, employee misuse or malware you have the right knowledge and tools to properly handle a forensics investigation.

During this forensics demonstration you will see how a professional forensics tool allows handling of massive data sets and utilization of a distributed workforce in order to quickly and effectively extract and analyse relevant evidence and get a full picture of what happened and who was involved while also preserving data integrity. For non-forensics experts, this demonstration will help to understand the basics of obtaining complete and accurate information for security forensic investigations and compliance reports.

ADVANCED PERSISTENT THREAT (APT) PROTECTION DEMO

The challenge in defending against advanced persistent threats comes from their complex and sophisticated nature (low-volume, professional, highly customized, well-funded, combining multiple methodologies) and their ability to threaten even the most protected information systems, especially if they rely on traditional, signature-based security techniques such as content-scanning, sender verification, reputation and creation of safe/unsafe lists.

During this demonstration you will see how a new-generation protection systems fill in the gaps left by traditional security techniques (firewalls, IPS, AV, and Web gateways) and deal with zero-day and targeted APT attacks.

PRIVILEGED USER SUPERVISION DEMO

The human factor is a common cause of security breaches. Privileged users' accounts are especially vulnerable because these users are able to directly access and manipulate sensitive information. Therefore, mismanagement of privileged identities puts your company at tremendous risk. However, at the same time, privileged accounts are especially difficult to manage and trace.

During this demonstration, you will see how privileged user supervision software addresses these problems. You will be able to observe how introduction of an independent auditor layer helps to monitor the work of your privileged users, controls their access and establish patterns of each user activity. You will learn about the alerts that you get when anomalous behaviour occurs, certain applications/systems are accessed, or unusual volumes of data are sent or received and how that allows you to address insider threats, improve control, protect access to enterprise resources and reduce risk.VULNERABILITY MANAGEMENT DEMO

Most of the cyber attacks exploit known security flaws for which remediation are available because organisations fail to manage and patch these vulnerabilities effectively.

Vulnerability Management software, that is going to be demonstrated, helps to maintain control over your network security by automatically identifying security vulnerabilities with external and internal scans, prioritising them according to the severity levels and impact on business, providing extensive, centralised reports (for both executive level and technical personnel) and verified remedies.

During this session you will see how this technology solution helps you to fix the vulnerabilities continuously, proactively and efficiently and in this way protect your business information while also significantly reducing your security managers' time researching, scanning and fixing network exposures.

DEVICE CONTROL AND PATCH & REMEDIATION DEMO

Outdated endpoint software patch management creates an easy path for cyber criminals. By eliminating vulnerabilities in third party applications and heterogeneous operating systems, IT risk can be effectively reduced, while endpoint operations can be improved. However, it is time consuming, costly and difficult to manually keep up and apply security or software changes across the entire organization.

Therefore, during this patch and remediation demonstration you will be introduced to a centralised management hub that automates discovery, assessment and remediation for heterogeneous endpoint environments and rapidly and accurately alerts your IT personnel when they need to take proactive actions on key issues. This allows standardizing endpoint configurations and automating patch management to keep networks and devices up to date, secure and efficient at all times across the entire endpoint environment. In addition, this solution reduces complexity in your IT environment, reduces maintenance resources and IT operational friction.

KILL ABUSE OF UNSTRUCTURED DATA DEMO

A large share of the critical business data (e.g. finance, HR and marketing documents, spreadsheets, presentations, media files) is unstructured or semi-structured, i.e. it is not in a database or a part of an application data store. Protecting this data is particularly challenging because the amount of such data is too vast to manually identify which of it is sensitive and exposed to risk, who owns it, who should and who should not be able to access it, who uses it and who abuses it and manage the access rights accordingly. This means that far too often vulnerable information is exposed to risk and abuse.

In this demonstration you will learn about the newest technology solutions for managing unstructured data, identifying sensitive information and stale data, aligning critical business assets with their proper owners and allowing access intelligently to reduce risks, abuse and comply with the strictest regulatory requirements.

UNIVERSAL THREAT MANAGEMENT (UTM) DEMO

Even though organisations increasingly face advanced cyber security threats, it is important to remember that the Internet is still full of less sophisticated threats of all shapes, sizes, and severities that could also cause you some serious issues ranging from data leakage to interrupted business operations. However, managing many separate single-purpose security devices and software is difficult, ineffective and prone to errors.

Universal treat management devices allow simplifying security management, reducing costs and protecting your organisation from a variety of threats. During this technology demonstration, you will be introduced to a multi-service platform that delivers a total security package that protects against attacks, viruses, Trojans, spyware, malware, spam, phishing and other malicious threats. RISK AND COMPLIANCE MANAGEMENT DEMO

Organisations often lack the ability to identify, measure, manage, monitor, review and report on IT risks and compliance gaps. They address these threats insufficiently because of inadequate efforts to handle multiple overlapping compliancy requirements and best-practice frameworks in each department separately and use inefficient, spreadsheet-based compliance reporting methods. In addition, they tend to overspend on manual audits and disparate data gathering. However, failure to monitor organisation's security state, track IT security metrics and map this information with business risk might cause business disruption, loss of important data and non-compliance with both internal policies and external regulations.

During this session you will witness how centralised, streamlined, automated technology for compliance and IT risk management helps to harmonise your controls, prioritise, assign and track your remediation efforts and responsibility while also saving time and reducing compliance costs. You will see how it allows establishing organization-wide consistency, optimising your IT resources and aligning them with your business strategy, minimising regulatory problems and streamlining audit workflows.

Please note that organisers reserve the right to change the agenda and the speakers of the event. Content of the trainings is a non-changing part of the conference.